[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3437378acmotherconferencesBook PagePublication PagesacswConference Proceedingsconference-collections
ACSW '21: Proceedings of the 2021 Australasian Computer Science Week Multiconference
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACSW '21: 2021 Australasian Computer Science Week Multiconference Dunedin New Zealand February 1 - 5, 2021
ISBN:
978-1-4503-8956-3
Published:
01 February 2021

Reflects downloads up to 15 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: AISC
research-article
A Comparative Study of ML-ELM and DNN for Intrusion Detection
Article No.: 1, Pages 1–7https://doi.org/10.1145/3437378.3437390

Intrusion detection remains one of the critical research issues in network security. Many machine learning algorithms have been proposed to develop intrusion detection systems, which can categorize network traffic into normal and anomalous classes. The ...

research-article
Barriers and Incentives to Cybersecurity Threat Information Sharing in Developing Countries: A Case Study of Saudi Arabia
Article No.: 2, Pages 1–8https://doi.org/10.1145/3437378.3437391

Threat information sharing practices have the potential to improve cyber security. However, participation in sharing communities is not widely adopted. The existing literature finds a variety of benefits and challenges that either promote or deter ...

research-article
A Survey on Formal Verification for Solidity Smart Contracts
Article No.: 3, Pages 1–10https://doi.org/10.1145/3437378.3437879

One of the 21st century’s hottest topics in the world of IT has been the emergence of what some predict to be the foundation stone for a new era of internet (web 3.0): Blockchain technology. Besides being the backbone of what we come to know as ...

research-article
A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical Systems
Article No.: 4, Pages 1–6https://doi.org/10.1145/3437378.3437393

Process-aware attack detection plays a key role in securing cyber-physical systems. A process-aware detection system (PADS) identifies a baseline behaviour of the physical process in cyber-physical systems and continuously attempts to detect deviations ...

research-article
A snapshot analysis of publicly available BYOD policies
Article No.: 5, Pages 1–6https://doi.org/10.1145/3437378.3437394

Bring your own device (BYOD) is the practice of bringing an individual’s own technology into the organisation for use in that environment. BYOD has become more commonplace in 2020 as a result of the COVID19 pandemic, as employees work from home, often ...

SESSION: AusPDC
research-article
FEPAC: A Framework for Evaluating Parallel Algorithms on Cluster Architectures
Article No.: 6, Pages 1–10https://doi.org/10.1145/3437378.3444363

For many years, computer scientists have explored the computing power of so-called computing clusters to address performance requirements of computationally intensive tasks. Historically, computing clusters have been optimized with run-time performance ...

research-article
SIMDify: Framework for SIMD-Processing with RISC-V Scalar Instruction Set
Article No.: 7, Pages 1–10https://doi.org/10.1145/3437378.3444364

In this work, we propose a parallel programming framework, SIMDify, which generates single-instruction-multiple-data (SIMD) processors that can achieve SIMD processing without using SIMD instructions. SIMDify takes an application machine code compiled ...

research-article
A Traffic and Resource Aware Online Storm Scheduler
Article No.: 8, Pages 1–10https://doi.org/10.1145/3437378.3444365

Streaming applications have become widespread with the advent of big data and IoT. They are latency-sensitive applications that aim to process vast amounts of data in near real time. They are usually modelled as directed graphs and their deployment and ...

research-article
Modeling and Emulation of an Osmotic Computing Ecosystem using OsmoticToolkit
Article No.: 9, Pages 1–9https://doi.org/10.1145/3437378.3444366

Digital services are increasingly becoming cyber-physical and osmotic, combining Cloud resources with Fog, Edge, and IoT devices. This trend can be observed in the e-health domain or in smart city applications where the location of software deployments ...

research-article
Serverless Edge Computing: Vision and Challenges
Article No.: 10, Pages 1–10https://doi.org/10.1145/3437378.3444367

Born from a need for a pure “pay-per-use” model and highly scalable platform, the “Serverless” paradigm emerged and has the potential to become a dominant way of building cloud applications. Although it was originally designed for cloud environments, ...

SESSION: HIKM
research-article
Tour de Tune 2 - Auditory-Game-Motor Synchronisation with Music Tempo in an Immersive Virtual Reality Exergame
Article No.: 11, Pages 1–10https://doi.org/10.1145/3437378.3437379

Physical activity has numerous benefits, but a large proportion of the population do not exercise enough. Exergaming, the combination of exercises and gaming, has been suggested as a means to increase physical activity for people not intrinsically ...

research-article
Establishing a Dialog Agent Policy using Deep Reinforcement Learning in the Psychotherapy Domain
Article No.: 12, Pages 1–9https://doi.org/10.1145/3437378.3437395

Recent years have seen a rise in the development and use of dialog agents (chatbots) including as personal friends, coaches and even counsellors (Virtual Counsellor, VC). Some of these [1] employ expert psychotherapy techniques, notably Cognitive ...

research-article
Handling uncertainty using features from pathology: opportunities in primary care data for developing high risk cancer survival methods
Article No.: 13, Pages 1–7https://doi.org/10.1145/3437378.3437381

More than 144 000 Australians were diagnosed with cancer in 2019. Diagnosing cancer in primary care is challenging due to the non-specific nature of cancer symptoms and its low prevalence. Understanding the epidemiology of cancer symptoms and patterns ...

research-article
On the Importance of Diversity in Re-Sampling for Imbalanced Data and Rare Events in Mortality Risk Models
Article No.: 14, Pages 1–8https://doi.org/10.1145/3437378.3437382

Surgical risk increases significantly when patients present with comorbid conditions. This has resulted in the creation of numerous risk stratification tools with the objective of formulating associated surgical risk to assist both surgeons and patients ...

research-article
Targeted Health Information Delivery Framework: Evaluation and Feedback from Potential Client End-users
Article No.: 15, Pages 1–9https://doi.org/10.1145/3437378.3437383

This paper describes the evaluation completed on a targeted health information delivery system from the perspective of potential client-type end-users. The system was created as a tool for Healthcare Practitioners (HCPs) to evaluate their clients and ...

research-article
Melanoma classification using EfficientNets and Ensemble of models with different input resolution
Article No.: 17, Pages 1–5https://doi.org/10.1145/3437378.3437396

Early and accurate detection of melanoma with data analytics can make treatment more effective. This paper proposes a method to classify melanoma cases using deep learning on dermoscopic images. The method demonstrates that heavy augmentation during ...

short-paper
Open Banking and Electronic Health Records
Article No.: 18, Pages 1–4https://doi.org/10.1145/3437378.3437397

The Open Banking model is a data sharing model emerging in financial services sector that involves technological and regulatory innovations designed to facilitate access to banking records by third party providers such as payment service providers. The ...

short-paper
A comparative analysis of sepsis digital phenotyping methods
Article No.: 19, Pages 1–4https://doi.org/10.1145/3437378.3437398

Health data captured in Electronic health records (EHRs) have enabled the development of computational approaches to improve patient management and treatment, including early diagnosis of severe conditions such as sepsis. The validity of these efforts, ...

short-paper
Classifying infective keratitis using a deep learning approach
Article No.: 20, Pages 1–4https://doi.org/10.1145/3437378.3437388

Early diagnosis of infective keratitis is critical as it is a vision-threatening condition that can lead to significant vision loss and ocular morbidity. Diagnosis of infective keratitis done through clinical findings and slit- lamp examination is ...

short-paper
Evaluation of Channel Performance in Seizure Prediction
Article No.: 21, Pages 1–4https://doi.org/10.1145/3437378.3437399

Since unprovoked seizures are identified as the biggest concern of epileptic patients, an effective seizure prediction device is definitely a game changer in epilepsy management. In order to apply seizure prediction in practical settings, seizure ...

SESSION: IE
research-article
Who am I? - Development and Analysis of an Interactive 3D Game for Psychometric Testing
Article No.: 22, Pages 1–10https://doi.org/10.1145/3437378.3442688

Psychometric testing has become a popular scientific method to measure individuals’ mental capabilities and behavioural styles. Traditional psychometric tests are standardised and usually require the completion of paper forms. This means they are ...

research-article
Observing the Stroop Effect within a First Person Shooter Concept
Article No.: 23, Pages 1–9https://doi.org/10.1145/3437378.3442689

Following the digitisation of the classic Stroop Colour and Word Test, a set of scenarios have been produced in a game engine using a First Person Shooter (FPS) video-game format to determine whether the Stroop effect is replicable, specifically in the ...

research-article
Archetypal Analysis Based Anomaly Detection for Improved Storytelling in Multiplayer Online Battle Arena Games
Article No.: 24, Pages 1–8https://doi.org/10.1145/3437378.3442690

Anomalies in esports refer to situations when something unexpected or unlikely happens. Rapid performance changes, unusual strategies, extraordinary plays, accelerated resource gains or team wipeouts comprise examples, but anomalies fundamentally ...

research-article
Gender Differences when Adopting Avatars for Educational Games
Article No.: 25, Pages 1–10https://doi.org/10.1145/3437378.3442691

Avatars act as digital representations of players or non-playing characters in games and other online environments, and also play a key role key in educational games. This study looks at gender differences that may impact on human avatar interactions, ...

research-article
Player Motivation in Therapy Games for Parkinson's Disease: A Scoping Review: Understanding meaningful play, self-determination and flow
Article No.: 26, Pages 1–10https://doi.org/10.1145/3437378.3442692

Good games are engaging for the right audience. They compel their players to come back and play, motivate their participation with meaningful moment-to-moment actions (meaningful play), help them develop a long-term engagement (self-determination), and ...

research-article
Application of Graphs for Story Generation in Video Games
Article No.: 27, Pages 1–6https://doi.org/10.1145/3437378.3442693

The paper presents the system based on the layered hierarchical graphs for game plot description implemented in Godot Engine using the JSON format. The aim of the presented research is to create a tool that both supports the decision-making process and ...

Contributors
  • University of Otago
  • Victoria University of Wellington
  • University of Otago
  • University of Otago
  • University of Otago
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 61 of 141 submissions, 43%
YearSubmittedAcceptedRate
ACSW '191416143%
Overall1416143%